Comparing Trade-off Based Models of the Internet

Size: px
Start display at page:

Download "Comparing Trade-off Based Models of the Internet"

Transcription

1 Fundamenta Informaticae 92 (2009) DOI /FI IOS Press Comparing Trade-off Based Models of the Internet Anthony Spatharis, Ilias Foudalis, Martha Sideri Computer Science Department Athens University Of Economics And Business Patision 76, Athens, Greece Christos Papadimitriou Computer Science Department University of California Berkeley, USA Abstract. We introduce and evaluate several new models of network growth. Our models are extensions of the FKP model, modifying and improving it in various dimensions. In all these models nodes arrive one by one, and each node is connected to previous nodes by optimizing a trade-off between a geometric objective ( last mile cost ) and a topological objective ( position in the network ). Our new models differ from the original FKP model in directions inspired by the real Internet: two or more edges are attached to each arriving node (while the FKP model produces a tree); these edges are chosen according to various criteria such as robustness; edges may be added to the network between old nodes; or only certain fertile nodes (an attribute that changes dynamically) are capable of attracting new edges. We evaluate these models, and compare them with the graph of the Internet s autonomous systems, with respect to a suite of many test parameters (such as average degree, power law exponent, and local clustering rank) proposed in the literature; to this end we have developed the network generation and measurement system Pandora. Keywords: Internet topology, power law, scale-free graphs, network generators, network modeling and simulation, complex networks Address for correspondence: Departmrnt of Computer Science, Athens University of Economics and Business, Patision 76, Athens, Atiki, Greece

2 364 A. Spatharis et al. / Comparing Trade-off Based Models of the Internet 1. Introduction The Internet is a worldwide, publicly accessible collection of many thousands of interconnected computer networks; it is also the platform of a significant and increasing part of humanity s economic and social activity. Understanding the structure of the Internet graph (the graph of the routers, or that of the 20,000 or so autonomous systems comprising the Internet),is a major research frontier in computer science. In particular, it is of great importance to develop realistic generative models of Internet-like graphs, since proposed new protocols and algorithms need to be tested on models that are as realistic as possible. In this regard, the observation, first made in [14], that the degrees of the Internet graph are power law distributed (instead of the normal distribution predicted by traditional random graph models) brought about a revolution in the area, ushering in sophisticated graph models intended to model Internet growth. Indeed, starting with the preferential attachment model [3], many such models have been proposed; see [1, 6, 11, 16, 17] for some surveys, and see [5, 7, 10, 12, 18, 21] for several reviews and bibliographies on scale-free networks from different perspectives. One of the most influential models of network growth is the so called FKP model proposed in [13]. In this model, nodes arrive in discrete times, one after the other, and each node is connected to the node that minimizes a linear combination of two objectives; euclidean distance, and topological (hop) distance from the center of the network (assumed to be the first node). While this model has been shown in [13] to produce power law distributed degrees for large areas of the trade-off, it has also several shortcomings. For example, the produced network is a tree, and in fact one with a huge number of leaves; as a consequence the average degree is two (much less than the average degree of the real Internet). See [4] for a comprehensive critique of the FKP model. In this paper we extend the FKP model in several novel directions, addressing these and other shortcomings. The models proposed differ from the original FKP model in various respects. In all but one of the models each new node is connected to the network via not one but several edges, chosen so to optimize the original trade-off; as a result, the network is no longer a tree. How these edges are chosen among those that have good trade-off values defines several variants of our model. One may insist that the few best edges are added; or that two edges that are, in some precise sense, far from one another. In some models an edge may be added, with some small probability, between nodes of the network other than the one that has just arrived; this reflects real-life situation in which new connections force an already existing node to increase its connectivity to the rest of the Internet. Finally trying to model another real-life phenomenon, we designate some nodes as fertile, an attribute which changes dynamically. New nodes can only connect to nodes that are presently fertile. In a recent authoritative survey of the area [17] it is pointed out that, when it comes to models of the Internet, there is a trade-off between simplicity and realism; that is, how accurately the model reflects properties of the real Internet, and how complicated and unintuitive does it have to be to achieve such closeness. We believe that the models presented here occupy a very attractive region in this trade-off. Importantly, we test these new models experimentally by calculating several key metrics proposed in the literature, such as average degree, power-law degree, clustering coefficient, etc. We use these metrics to compare the various models, one against the other as well as each with previously proposed models, and with the real Internet. This comprehensive testing methodology, as well as the experimental system Pandora for performing these tests that we have created and made available on the Internet, is another contribution of this paper. Our experiments show that these models produce graphs that are in excellent agreement with the Internet with respect to the test parameters.

3 A. Spatharis et al. / Comparing Trade-off Based Models of the Internet 365 The rest of the paper is organized as follows. Section two provides a brief review of the background and related work. In section three the new models are presented and discussed. In section four we present our experimental results, measurements, and comparisons, and we briefly describe the Pandora system. Finally, in section five we discuss our findings and chart future work. 2. Background and Related Work The oldest and most influential model of random graphs is the 1959 G[n,p] model of Erdős and Renyi, in which edges among n nodes are selected independently with probability p; the degrees are thus concentrated by a Gaussian distribution, according to the central limit theorem. However, it was observed in [14] that the degree distribution of the Internet topology exhibits a power law degree distribution: P(k > x) x γ, (1) where γ is the shape parameter or tail exponent. It was later pointed out that, in addition, Internet graphs are highly clustered, among other properties. Many evolutionary models (in which nodes arrive one by one and are somehow connected to the already existing nodes) have been proposed to explain these observations. Of these, the preferential attachment models assume that the arriving node is connected to old ones with probability proportional to their degrees [1, 3]. In the trade-off based models [2, 9, 13] the connections are such that a multi-objective criterion is optimized. Both of these families of models have been shown to generate power law degree distributions, but are lacking with respect to other criteria. We next focus on the FKP model. The original trade-off model FKP [13] is a simple evolutionary model. Each node i (after the first one) is a uniformly random point in the unit square, and attaches itself to the node j that minimizes this weighted sum of two objectives: min j<i (α d ij + ecc(j)). (2) The first term is the Euclidean distance between the two nodes (the last mile cost ), while the second is the eccentricity of j, its distance from the center (assumed for simplicity to be the first node). α is a weight, capturing the relative importance of the two objectives. It is proved in [13] that, for all but extremely small and extremely large values of this parameter, the degree sequence of the resulting graph is power law distributed [4, 13]. The conceptual advantage of the FKP model over, say, the preferential attachment model is that attachment preference is based on a plausible network-motivated objective, as opposed to being postulated. 3. The Network Models There are many reasons why, despite its initial promise, the original FKP model fails to be a good model of the Internet Topology. Since each node attaches itself to the network by a single edge, the resulting graph is a tree; to put it otherwise, the average degree of each node is two, whereas the average degree of the Internet AS graph is 4.6.

4 366 A. Spatharis et al. / Comparing Trade-off Based Models of the Internet 3.1. Best Two (BT) model In the simplest and most basic modification of FKP called Best Two, when a new node i arrives, instead of selecting one node j that minimizes (2), the two best such nodes are chosen, and are connected to node i. This immediately gives the graph a nontree structure and increases the average degree to four, much closer to the Internet s 4.6. One disadvantage of this method is that the two nodes that optimize (2) may be very close, resulting in connections and paths of low diversity. Figure 1. to be 2. Graph generated by the best two algorithm. In all figures, node labels are order of arrival; α is asssumed For example, in Figure 1 when the new node 5 arrives, the FKP criterion first chooses node 2, while the second node chosen will be node Independent path (IP) model In this model when the new node i arrives, first is linked to a node j according to (2). A second edge is attached from the new node i to another node k j that minimizes the following quantity: min k<i,k j (α d ik + Com(j,k)), (3) where Com(j,k) is the number of common nodes of the two shortest paths from j and k to the center. In other words, this model favors second connections that are different from the first. Figure 2. Graph generated by the independent path algorithm.

5 A. Spatharis et al. / Comparing Trade-off Based Models of the Internet 367 Let us see what happens when node 5 enters the graph in Figure 2. The first node selected is node 2. But in contrast with the BT model, the second node selected is node Enhanced models In the real Internet, connections are not created only when a new node arrives. As old nodes acquire more connections and attract more traffic they may seek new upstream connections. This is captured by adding to the previous models the following additional step: After the new node has been connected to the two previous nodes, one of these two previous nodes, say j, is connected, with probability p, to another existing node, called the peering node. The peering node is the one which minimizes (2) for. By adding this feature to the Best of Two and the Independent Path models, one obtains the Enhanced Best Two (EBT) and Enhanced Independent Path (EIP). When p = 0 the non-enhanced models are obtained, while for p = 0.3 the average degree of the resulting graph is 4.6, the same as of that of the real Internet The controlled distance (CD) model In this new model, when a new node i arrives, it connects to an existing node j in the graph, that minimizes (2). A second edge connects node i to an existing node k that minimizes (2), subject to the constraint that the hop distance between nodes j and k is at least a fixed lower bound, such as 4. To implement this algorithm one needs a data structure that maintains the hop distance between any two nodes in the graph. Figure 3. Graph generated by the controlled distance algorithm. For example, in Figure 3 the second node selected by node 4 could be node 1 and not node 2 (as would happen in the BT model, for example), because node 1 has larger hop distance from the first connection, node The Fertile Node (FN) model The graph of the real Internet has a low power law exponent, and only 26% of its nodes as leaves. The FKP model also has a low power law exponent, but the great majority of its nodes are leaves. The Fertile Node (FN) model achieves a low exponent while at the same time maintaining a low number of leaves.

6 368 A. Spatharis et al. / Comparing Trade-off Based Models of the Internet Its motivation comes from the real Internet: Many autonomous systems are initially not available to new customers, but they may become as connectivity demand in their neighborhood grows. Let A 1 be an integer parameter. The FN algorithm maintains a set F of fertile nodes; initially, only the first node is in F. Each new node i > 0 is connnected to the fertile node optimizaing the trade-off: min j F (α d ij + ecc(j)). (4) Finally, if the chosen node j has more than A infertile children, then the infertile child of i that is closest to j becomes fertile and is inserted to F. Figure 4. Graph generated by the fertile node algorithm. In Figure 4 the value of A is two. Thus, when node 0 has more than two infertile children, the closest one (node 1) becomes fertile. 4. Comparison of the Models 4.1. The Pandora System There are many topology generators available. However, while implementing and analyzing the models in this paper, the authors realized that there was no single generator that could accommodate our models with reasonable effort. We therefore implemented our own network topology generator and analyzer, called Pandora, with these characteristics: 1. Large scale: Depending on the algorithm, the generator can produce graphs up to 80, 000 nodes.

7 A. Spatharis et al. / Comparing Trade-off Based Models of the Internet Extensible: Any researcher with a little knowledge on programming can write their own algorithms and metrics and add them to the generator. For example, once the user is accustomed to the features of the generator, the FKP algorithm can be implemented in 5 minutes. 3. Flexible: The generator can import files from inet, pandora and topgen formats and export data to otter and pajek formats. 4. User friendly: The simplicity of the design of the generator minimizes the time for a person to familiarize and use the generator. New users have started writing code within minutes. 5. Portable: Implemented in Java, the generator can run on any platform. For mode details, more experimental results, and for actually using and downloading Pandora, see [15] The Metrics We chose eight different metrics for evaluating and comparing our models; many of these metrics were proposed in [8]. 1. The first three parameters are related to the degree distribution. The average degree (or, equivalently, the number of edges) is the most basic one. 2. The degree exponent γ, found by regression analysis on a log-log plot of the degree distribution. The relative frequency of nodes of degree d is proportional to k γ. 3. The power law max degree is the natural cut-off of the degree probability density function, defined as n 1 γ 1, where n is the number of nodes. 4. Another important aspect of graph structure is the joint degree distribution, looking at the degree distribution among the neighbors of a node with a given degree. Two summary statistics of the joint degree distribution are the average neighbor degree and the assortativity coefficient. The average neighbor degree of a k 1 degree node is equal to: Dmax k 2 =1 k 2 P(k 2 k 1 ). (5) where P(k 2 k 1 ) is a conditional probability that given a node with degree k 1 will be connected with a node of degree k 2 and Dmax is the maximum degree of the graph. Max neighbor degree is the average neighbor degree for k 1 = Dmax. Average neighbor degree of the whole graph is the average of Eq.(5) for all the degrees. 5. The assortativity coefficient quantifies the connection between nodes of similar degree. If nodes of high degree tend to be connected with node of low degree then we say that the graph is dissasortative, if they connect to nodes of similar degree the graph si called assortative. Notice that the assortativity coefficient and the average neighbor degree are very close in meaning: Graphs

8 370 A. Spatharis et al. / Comparing Trade-off Based Models of the Internet with low average neighbor degree or is characterized as dissasortative, and is vulnerable to random failures and virus attacks. On the other hand such graphs are better at traffic monitoring and prevention of DoS attacks [19]. 6. We finally consider two key metrics related to clustering. Mean local clustering is the average value of LC(k), that is the average number of links between neighbors of k-degree nodes. 7. Finally, the clustering exponent is the exponent of the log-log plot of local clustering vs. degree Results Table 1 displays the results of calculating these metrics for the output of five of our models, and comparing them to the same metrics of the actual Internet graph obtained from [8]. We also compare our models with two classic models of internet topology, FKP and a variant of the classical BA model as produced by the inet 3.0 topology generator [22]. Each entry of the table represents the average of 15 runs. To compare the models effectively, the generated graphs have the same number n = 5556 of nodes as the Internet graph data in [8]. Table 1. Model Comparissons. BGP Tables FKP BA EBT CD IP FN EIP Reduced Number of edges Average degree Frequent exponent (γ) Power law max degree Assortativity coefficient Norm. average neighbor degree Norm. max neighbor degree Mean Local clustering Clustering exponent Networks with high average degree tend to be better connected. As it was mentioned before, the enhanced best two and independent path models achieve an average degree of 4.6, which is very close to the real Internet graph data. Since the degree distribution is maybe the most commonly used topology characteristic, in all our models we adjusted parameters so as to agree with the Internet graph on this metric. All our models produce a very good frequent exponent and maximum power law degree. As for the other metrics, the controlled distance, independent path and fertile node models tend to be much closer to the Internet data in terms of assortativity coefficient. Concerning neighbor degree metrics, we notice that most of our models are not close to the Internet with respect of the value of maximum neighbor degree but in terms of average neighbor degree achieve good results. The fertile model is closer to he Internet graph data than the FKP model without fertility according to all metrics, and achieves a very good frequent exponent.

9 A. Spatharis et al. / Comparing Trade-off Based Models of the Internet 371 Finally, the independent path model is the most accurate with respect to the clustering metrics; the fertile model, always generating a tree, is, of course, highly inaccurate in this regard. 5. Conclusions and Future Work The FKP model was a first attempt to take into account the complex and decentralized decision making involved in the evolution of the Internet; its power law behavior can be shown analytically, and its power law exponent is, empirically, quite accurate. On the negative side, the FKP model generates trees with no clustering and too many leaves. The extensions of the FKP model introduced and evaluated in this paper occupy a very interesting point in the accuracy-simplicity trade off, being quite simple and intuitive, while at the same time the producing graphs are rather Internet-like. Furthermore, the experimental methodology (generic and flexible topology generator and standardized metric calculation) used in this paper may be useful in future work. The models proposed are simple enough that some of the crucial metrics may be possible to calculate analytically. We have some preliminary results on the exponent of the fertile node model [20], but much work is needed to be done on this front. Finally, it would be interesting to incorporate in our models deletions of nodes and edges, certainly an element of the real Internet which, to our knowledge, has not been considered in the literature. References [1] Albert, R., Barabási, A.: Statistical Mechanics of Complex Networks, Reviews of Modern Physics, 74, 2002, 47. [2] Alvarez-Hamelin, J. I., Schabanel, N.: An Internet Graph Model Based on Trade-off Optimization, The European Physical Journal B - Condensed Matter and Complex Systems, 38, 2004, [3] Barabási, A., Albert, R.: Emergence of Scaling in Random Networks, SCIENCE: Science, 286, 1999, [4] Berger, N., Bollobás, B., Borgs, C., Chayes, J., Riordan, O.: Degree Distribution of the FKP Network Model, TCS: Theoretical Computer Science, 379, 2007, [5] Bollobás, B., Riordan, O.: Mathematical Results on Scale-free Random Graphs, in: Handbook of Graphs and Networks: From the Genome to the Internet, Bornholdt and Schuster, [6] Bonato, A.: A Survey of Models of the Web Graph, Workshop on Combinatorial and Algorithmic Aspects of Networking (CAAN), LNCS, 1, [7] Brandes, U., Erlebach, T., Eds.: Network Analysis: Methodological Foundations [outcome of a Dagstuhl seminar, April 2004], vol of Lecture Notes in Computer Science, Springer, [8] CAIDA: The Cooperative Association for Internet Data Analysis. In BGP: Internet Data Catalog: [9] Chen, Q., Chang, H., Govindan, R., Jamin, S., Shenker, S., Willinger, W.: The Origin of Power-Laws in Internet Topologies Revisited, INFOCOM, [10] Costa, L., Rodrigues, F., Travieso, G., Boas, A. V.: Characterization of complex networks: A survey of measurements, Advances in Physics, 56, 2005,

10 372 A. Spatharis et al. / Comparing Trade-off Based Models of the Internet [11] Dhamdhere, A., Dovrolis, C.: Ten years in the evolution of the internet ecosystem, Internet Measurement Conference (K. Papagiannaki, Z.-L. Zhang, Eds.), ACM, [12] Dorogovtsev, S., Mendes, J.: Evolution of Networks : from Biological Nets to the Internet and WWW, Oxford University Press, [13] Fabrikant, A., Koutsoupias, E., Papadimitriou, C.: Heuristically Optimized Trade-Offs: A New Paradigm for Power Laws in the Internet, ICALP: Annual International Colloquium on Automata, Languages and Programming, [14] Faloutsos, M., Faloutsos, P., Faloutsos, C.: On Power-Law Relationships of the Internet Topology, ACM SIGCOMM 99, [15] Foudalis, I.: Pandora Topology Generator, [16] Haddadi, H., Rio, M., Iannaccone, G., Moore, A., Mortier, R.: Network topologies: inference, modeling, and generation, Communications Surveys & Tutorials, IEEE, 10, 2008, [17] Krioukov, D., Chung, F., Claffy, K., Fomenkov, M., Vespignani, A., Willinger, W.: The Workshop on Internet Topology (WIT) Report, ACM SIGCOMM Computer Communication, 37(1), December , [18] Mitzenmacher, M., Siganos, G., Faloutsos, M., Faloutsos, P., Faloutsos, C.: Brief History of Generative Models for Power Law and Lognormal Distributions, Internet Math, 1, 2004, [19] Park, K., Lee, H.: On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets, SIGCOMM, [20] Spatharis, A., Foudalis, I., Sideri, M.: Competition-Induced Tradeoff-based Modeling of the Internet, Technical report, Athens University Of Economics And Business, [21] Strogatz, S.: Exploring Complex Networks, NATURE: Nature, 410, 2001, [22] Winick, J., Jin, C., Chen, Q., Jamin, S.: Inet-3.0 Topology Generator,

Towards Modelling The Internet Topology The Interactive Growth Model

Towards Modelling The Internet Topology The Interactive Growth Model Towards Modelling The Internet Topology The Interactive Growth Model Shi Zhou (member of IEEE & IEE) Department of Electronic Engineering Queen Mary, University of London Mile End Road, London, E1 4NS

More information

Analysis of Internet Topologies

Analysis of Internet Topologies Analysis of Internet Topologies Ljiljana Trajković ljilja@cs.sfu.ca Communication Networks Laboratory http://www.ensc.sfu.ca/cnl School of Engineering Science Simon Fraser University, Vancouver, British

More information

Graph models for the Web and the Internet. Elias Koutsoupias University of Athens and UCLA. Crete, July 2003

Graph models for the Web and the Internet. Elias Koutsoupias University of Athens and UCLA. Crete, July 2003 Graph models for the Web and the Internet Elias Koutsoupias University of Athens and UCLA Crete, July 2003 Outline of the lecture Small world phenomenon The shape of the Web graph Searching and navigation

More information

Inet-3.0: Internet Topology Generator

Inet-3.0: Internet Topology Generator Inet-3.: Internet Topology Generator Jared Winick Sugih Jamin {jwinick,jamin}@eecs.umich.edu CSE-TR-456-2 Abstract In this report we present version 3. of Inet, an Autonomous System (AS) level Internet

More information

Analysis of Internet Topologies: A Historical View

Analysis of Internet Topologies: A Historical View Analysis of Internet Topologies: A Historical View Mohamadreza Najiminaini, Laxmi Subedi, and Ljiljana Trajković Communication Networks Laboratory http://www.ensc.sfu.ca/cnl Simon Fraser University Vancouver,

More information

Analyzing and modelling the AS-level Internet topology

Analyzing and modelling the AS-level Internet topology Analyzing and modelling the AS-level Internet topology Shi Zhou & Raul J. Mondragon Department of Electronic Engineering Queen Mary, University of London Mile End Road, London, E1 4NS, United Kingdom Email:

More information

An Incremental Super-Linear Preferential Internet Topology Model

An Incremental Super-Linear Preferential Internet Topology Model An Incremental Super-Linear Preferential Internet Topology Model Extended Abstract Sagy Bar 1, Mira Gonen 2, and Avishai Wool 3 1 School of Electrical Engineering, Tel Aviv University, Ramat Aviv 69978,

More information

Characterizing and Modelling Clustering Features in AS-Level Internet Topology

Characterizing and Modelling Clustering Features in AS-Level Internet Topology Characterizing and Modelling Clustering Features in AS-Level Topology Yan Li, Jun-Hong Cui, Dario Maggiorini and Michalis Faloutsos yan.li@uconn.edu, jcui@engr.uconn.edu, dario@dico.unimi.it, michalis@cs.ucr.edu

More information

Degree distribution of the FKP network model

Degree distribution of the FKP network model Degree distribution of the FKP network model Noam Berger 1, Béla Bollobás 2,3, Christian Borgs 4, Jennifer Chayes 4, and Oliver Riordan 3 1 Department of Statistics, University of California, Berkeley,

More information

Understanding the evolution dynamics of internet topology

Understanding the evolution dynamics of internet topology Understanding the evolution dynamics of internet topology Shi Zhou* University College London, Adastral Park Campus, Ross Building, Ipswich, IP5 3RE, United Kingdom Received 2 December 2005; revised manuscript

More information

Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network

Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network , pp.273-284 http://dx.doi.org/10.14257/ijdta.2015.8.5.24 Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network Gengxin Sun 1, Sheng Bin 2 and

More information

The Joint Degree Distribution as a Definitive Metric of the Internet AS-level Topologies

The Joint Degree Distribution as a Definitive Metric of the Internet AS-level Topologies The Joint Degree Distribution as a Definitive Metric of the Internet AS-level Topologies Priya Mahadevan, Dimitri Krioukov, Marina Fomenkov, Brad Huffaker, Xenofontas Dimitropoulos, kc claffy, Amin Vahdat

More information

Evolution of the Internet AS-Level Ecosystem

Evolution of the Internet AS-Level Ecosystem Evolution of the Internet AS-Level Ecosystem Srinivas Shakkottai, Marina Fomenkov 2, Ryan Koga 2, Dmitri Krioukov 2, and kc claffy 2 Texas A&M University, College Station, USA, sshakkot@tamu.edu, 2 Cooperative

More information

The Internet Is Like A Jellyfish

The Internet Is Like A Jellyfish The Internet Is Like A Jellyfish Michalis Faloutsos UC Riverside Joint work with: Leslie Tauro, Georgos Siganos (UCR) Chris Palmer(CMU) Big Picture: Modeling the Internet Topology Traffic Protocols Routing,

More information

The Shape of the Network. The Shape of the Internet. Why study topology? Internet topologies. Early work. More on topologies..

The Shape of the Network. The Shape of the Internet. Why study topology? Internet topologies. Early work. More on topologies.. The Shape of the Internet Slides assembled by Jeff Chase Duke University (thanks to and ) The Shape of the Network Characterizing shape : AS-level topology: who connects to whom Router-level topology:

More information

On Realistic Network Topologies for Simulation

On Realistic Network Topologies for Simulation On Realistic Network Topologies for Simulation Oliver Heckmann, Michael Piringer, Jens Schmitt, Ralf Steinmetz Multimedia Communications (KOM), Department of Electronic Engineering & Information Technology

More information

ModelingandSimulationofthe OpenSourceSoftware Community

ModelingandSimulationofthe OpenSourceSoftware Community ModelingandSimulationofthe OpenSourceSoftware Community Yongqin Gao, GregMadey Departmentof ComputerScience and Engineering University ofnotre Dame ygao,gmadey@nd.edu Vince Freeh Department of ComputerScience

More information

Small-World Characteristics of Internet Topologies and Implications on Multicast Scaling

Small-World Characteristics of Internet Topologies and Implications on Multicast Scaling Small-World Characteristics of Internet Topologies and Implications on Multicast Scaling Shudong Jin Department of Electrical Engineering and Computer Science, Case Western Reserve University Cleveland,

More information

Scaling Properties of the Internet Graph

Scaling Properties of the Internet Graph Scaling Properties of the Internet Graph Aditya Akella Shuchi Chawla Arvind Kannan Srinivasan Seshan Computer Science Department Carnegie Mellon University Pittsburgh, PA 53 {aditya,shuchi}@cs.cmu.edu

More information

Greedy Routing on Hidden Metric Spaces as a Foundation of Scalable Routing Architectures

Greedy Routing on Hidden Metric Spaces as a Foundation of Scalable Routing Architectures Greedy Routing on Hidden Metric Spaces as a Foundation of Scalable Routing Architectures Dmitri Krioukov, kc claffy, and Kevin Fall CAIDA/UCSD, and Intel Research, Berkeley Problem High-level Routing is

More information

Complex Network Visualization based on Voronoi Diagram and Smoothed-particle Hydrodynamics

Complex Network Visualization based on Voronoi Diagram and Smoothed-particle Hydrodynamics Complex Network Visualization based on Voronoi Diagram and Smoothed-particle Hydrodynamics Zhao Wenbin 1, Zhao Zhengxu 2 1 School of Instrument Science and Engineering, Southeast University, Nanjing, Jiangsu

More information

Computer Network Topologies: Models and Generation Tools

Computer Network Topologies: Models and Generation Tools Consiglio Nazionale delle Ricerche Technical Report n. 5/200 Computer Network Topologies: Models and Generation Tools Giuseppe Di Fatta, Giuseppe Lo Presti 2, Giuseppe Lo Re CE.R.E. Researcher 2 CE.R.E.,

More information

The Structure of an Autonomic Network

The Structure of an Autonomic Network doi:1.198/rspa.27.182 Published online Radial structure of the Internet BY PETTER HOLME 1, *, JOSH KARLIN 1 AND STEPHANIE FORREST 1,2 1 Department of Computer Science, University of New Mexico, Albuquerque,

More information

Chapter 29 Scale-Free Network Topologies with Clustering Similar to Online Social Networks

Chapter 29 Scale-Free Network Topologies with Clustering Similar to Online Social Networks Chapter 29 Scale-Free Network Topologies with Clustering Similar to Online Social Networks Imre Varga Abstract In this paper I propose a novel method to model real online social networks where the growing

More information

Temporal Dynamics of Scale-Free Networks

Temporal Dynamics of Scale-Free Networks Temporal Dynamics of Scale-Free Networks Erez Shmueli, Yaniv Altshuler, and Alex Sandy Pentland MIT Media Lab {shmueli,yanival,sandy}@media.mit.edu Abstract. Many social, biological, and technological

More information

How To Find Influence Between Two Concepts In A Network

How To Find Influence Between Two Concepts In A Network 2014 UKSim-AMSS 16th International Conference on Computer Modelling and Simulation Influence Discovery in Semantic Networks: An Initial Approach Marcello Trovati and Ovidiu Bagdasar School of Computing

More information

Self similarity of complex networks & hidden metric spaces

Self similarity of complex networks & hidden metric spaces Self similarity of complex networks & hidden metric spaces M. ÁNGELES SERRANO Departament de Química Física Universitat de Barcelona TERA-NET: Toward Evolutive Routing Algorithms for scale-free/internet-like

More information

Protein Protein Interaction Networks

Protein Protein Interaction Networks Functional Pattern Mining from Genome Scale Protein Protein Interaction Networks Young-Rae Cho, Ph.D. Assistant Professor Department of Computer Science Baylor University it My Definition of Bioinformatics

More information

USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS

USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS Natarajan Meghanathan Jackson State University, 1400 Lynch St, Jackson, MS, USA natarajan.meghanathan@jsums.edu

More information

On Generating Graphs with Prescribed Vertex Degrees for Complex Network Modeling 1. College of Computing Georgia Institute of Technology

On Generating Graphs with Prescribed Vertex Degrees for Complex Network Modeling 1. College of Computing Georgia Institute of Technology On Generating Graphs with Prescribed Vertex Degrees for Complex Network Modeling 1 Milena Mihail Nisheeth K. Vishnoi College of Computing Georgia Institute of Technology Abstract Graph models for real-world

More information

Graphs over Time Densification Laws, Shrinking Diameters and Possible Explanations

Graphs over Time Densification Laws, Shrinking Diameters and Possible Explanations Graphs over Time Densification Laws, Shrinking Diameters and Possible Explanations Jurij Leskovec, CMU Jon Kleinberg, Cornell Christos Faloutsos, CMU 1 Introduction What can we do with graphs? What patterns

More information

A discussion of Statistical Mechanics of Complex Networks P. Part I

A discussion of Statistical Mechanics of Complex Networks P. Part I A discussion of Statistical Mechanics of Complex Networks Part I Review of Modern Physics, Vol. 74, 2002 Small Word Networks Clustering Coefficient Scale-Free Networks Erdös-Rényi model cover only parts

More information

Distance Degree Sequences for Network Analysis

Distance Degree Sequences for Network Analysis Universität Konstanz Computer & Information Science Algorithmics Group 15 Mar 2005 based on Palmer, Gibbons, and Faloutsos: ANF A Fast and Scalable Tool for Data Mining in Massive Graphs, SIGKDD 02. Motivation

More information

Evaluation of a New Method for Measuring the Internet Degree Distribution: Simulation Results

Evaluation of a New Method for Measuring the Internet Degree Distribution: Simulation Results Evaluation of a New Method for Measuring the Internet Distribution: Simulation Results Christophe Crespelle and Fabien Tarissan LIP6 CNRS and Université Pierre et Marie Curie Paris 6 4 avenue du président

More information

Distributed Computing over Communication Networks: Topology. (with an excursion to P2P)

Distributed Computing over Communication Networks: Topology. (with an excursion to P2P) Distributed Computing over Communication Networks: Topology (with an excursion to P2P) Some administrative comments... There will be a Skript for this part of the lecture. (Same as slides, except for today...

More information

Decentralized Utility-based Sensor Network Design

Decentralized Utility-based Sensor Network Design Decentralized Utility-based Sensor Network Design Narayanan Sadagopan and Bhaskar Krishnamachari University of Southern California, Los Angeles, CA 90089-0781, USA narayans@cs.usc.edu, bkrishna@usc.edu

More information

Effects of node buffer and capacity on network traffic

Effects of node buffer and capacity on network traffic Chin. Phys. B Vol. 21, No. 9 (212) 9892 Effects of node buffer and capacity on network traffic Ling Xiang( 凌 翔 ) a), Hu Mao-Bin( 胡 茂 彬 ) b), and Ding Jian-Xun( 丁 建 勋 ) a) a) School of Transportation Engineering,

More information

Structural constraints in complex networks

Structural constraints in complex networks Structural constraints in complex networks Dr. Shi Zhou Lecturer of University College London Royal Academy of Engineering / EPSRC Research Fellow Part 1. Complex networks and three key topological properties

More information

Graph Theory and Complex Networks: An Introduction. Chapter 08: Computer networks

Graph Theory and Complex Networks: An Introduction. Chapter 08: Computer networks Graph Theory and Complex Networks: An Introduction Maarten van Steen VU Amsterdam, Dept. Computer Science Room R4.20, steen@cs.vu.nl Chapter 08: Computer networks Version: March 3, 2011 2 / 53 Contents

More information

Why Rumors Spread Fast in Social Networks

Why Rumors Spread Fast in Social Networks Why Rumors Spread Fast in Social Networks Benjamin Doerr 1, Mahmoud Fouz 2, and Tobias Friedrich 1,2 1 Max-Planck-Institut für Informatik, Saarbrücken, Germany 2 Universität des Saarlandes, Saarbrücken,

More information

Internet Topology of the Power-Laws

Internet Topology of the Power-Laws Power-Laws and the AS-level Internet Topology Georgos Siganos,Michalis Faloutsos,Petros Faloutsos,Christos Faloutsos Abstract In this paper, we study and characterize the topology of the Internet at the

More information

On the Impact of Route Monitor Selection

On the Impact of Route Monitor Selection On the Impact of Route Monitor Selection Ying Zhang Zheng Zhang Z. Morley Mao Y. Charlie Hu Bruce Maggs Univ. of Michigan Purdue Univ. Univ. of Michigan Purdue Univ. CMU Paper ID: E-578473438 Number of

More information

Collapse by Cascading Failures in Hybrid Attacked Regional Internet

Collapse by Cascading Failures in Hybrid Attacked Regional Internet Collapse by Cascading Failures in Hybrid Attacked Regional Internet Ye Xu and Zhuo Wang College of Information Science and Engineering, Shenyang Ligong University, Shenyang China xuy.mail@gmail.com Abstract

More information

An Alternative Web Search Strategy? Abstract

An Alternative Web Search Strategy? Abstract An Alternative Web Search Strategy? V.-H. Winterer, Rechenzentrum Universität Freiburg (Dated: November 2007) Abstract We propose an alternative Web search strategy taking advantage of the knowledge on

More information

Graph Mining Techniques for Social Media Analysis

Graph Mining Techniques for Social Media Analysis Graph Mining Techniques for Social Media Analysis Mary McGlohon Christos Faloutsos 1 1-1 What is graph mining? Extracting useful knowledge (patterns, outliers, etc.) from structured data that can be represented

More information

GENERATING AN ASSORTATIVE NETWORK WITH A GIVEN DEGREE DISTRIBUTION

GENERATING AN ASSORTATIVE NETWORK WITH A GIVEN DEGREE DISTRIBUTION International Journal of Bifurcation and Chaos, Vol. 18, o. 11 (2008) 3495 3502 c World Scientific Publishing Company GEERATIG A ASSORTATIVE ETWORK WITH A GIVE DEGREE DISTRIBUTIO JI ZHOU, XIAOKE XU, JIE

More information

Some Examples of Network Measurements

Some Examples of Network Measurements Some Examples of Network Measurements Example 1 Data: Traceroute measurements Objective: Inferring Internet topology at the router-level Example 2 Data: Traceroute measurements Objective: Inferring Internet

More information

Zipf s law and the Internet

Zipf s law and the Internet Glottometrics 3, 2002,143-150 To honor G.K. Zipf Zipf s law and the Internet Lada A. Adamic 1 Bernardo A. Huberman Abstract. Zipf's law governs many features of the Internet. Observations of Zipf distributions,

More information

Dmitri Krioukov CAIDA/UCSD

Dmitri Krioukov CAIDA/UCSD Hyperbolic geometry of complex networks Dmitri Krioukov CAIDA/UCSD dima@caida.org F. Papadopoulos, M. Boguñá, A. Vahdat, and kc claffy Complex networks Technological Internet Transportation Power grid

More information

Random graphs and complex networks

Random graphs and complex networks Random graphs and complex networks Remco van der Hofstad Honours Class, spring 2008 Complex networks Figure 2 Ye a s t p ro te in in te ra c tio n n e tw o rk. A m a p o f p ro tein p ro tein in tera c

More information

Guiding Web Proxy and Server Placement for High Performance Internet Content Delivery 1

Guiding Web Proxy and Server Placement for High Performance Internet Content Delivery 1 Guiding Web Proxy and Server Placement for High Performance Internet Content Delivery 1 Peter Triantafillou (contact author) Department of Computer Engineering and Informatics, University of Patras Rio

More information

Heuristically Optimized Trade-offs: A New Paradigm for Power Laws in the Internet

Heuristically Optimized Trade-offs: A New Paradigm for Power Laws in the Internet Heuristically Optimized Trade-offs: A New Paradigm for Power Laws in the Internet Alex Fabrikant 1, Elias Koutsoupias 2, and Christos H. Papadimitriou 1 1 Computer Science Division University of California

More information

BGP Prefix Hijack: An Empirical Investigation of a Theoretical Effect Masters Project

BGP Prefix Hijack: An Empirical Investigation of a Theoretical Effect Masters Project BGP Prefix Hijack: An Empirical Investigation of a Theoretical Effect Masters Project Advisor: Sharon Goldberg Adam Udi 1 Introduction Interdomain routing, the primary method of communication on the internet,

More information

A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks

A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks Mohammad HossienYaghmae Computer Department, Faculty of Engineering, Ferdowsi University of Mashhad, Mashhad, Iran hyaghmae@ferdowsi.um.ac.ir

More information

Network Performance Monitoring at Small Time Scales

Network Performance Monitoring at Small Time Scales Network Performance Monitoring at Small Time Scales Konstantina Papagiannaki, Rene Cruz, Christophe Diot Sprint ATL Burlingame, CA dina@sprintlabs.com Electrical and Computer Engineering Department University

More information

On the Eyeshots of BGP Vantage Points

On the Eyeshots of BGP Vantage Points On the Eyeshots of BGP Vantage Points Kai Chen, Chengchen Hu, Wenwen Zhang, Yan Chen, Bin Liu Northwestern University, Tsinghua University, University of Illinois at Chicago {kchen, ychen}@northwestern.edu,

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental

More information

Efficient Detection of Ddos Attacks by Entropy Variation

Efficient Detection of Ddos Attacks by Entropy Variation IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727 Volume 7, Issue 1 (Nov-Dec. 2012), PP 13-18 Efficient Detection of Ddos Attacks by Entropy Variation 1 V.Sus hma R eddy,

More information

EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK

EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK S.Abarna 1, R.Padmapriya 2 1 Mphil Scholar, 2 Assistant Professor, Department of Computer Science,

More information

Security-Aware Beacon Based Network Monitoring

Security-Aware Beacon Based Network Monitoring Security-Aware Beacon Based Network Monitoring Masahiro Sasaki, Liang Zhao, Hiroshi Nagamochi Graduate School of Informatics, Kyoto University, Kyoto, Japan Email: {sasaki, liang, nag}@amp.i.kyoto-u.ac.jp

More information

Statistical theory of Internet exploration

Statistical theory of Internet exploration Statistical theory of Internet exploration Luca Dall Asta, 1 Ignacio Alvarez-Hamelin, 1,2 Alain Barrat, 1 Alexei Vázquez, 3 and Alessandro Vespignani 1,4 1 Laboratoire de Physique Théorique, Bâtiment 210,

More information

Research Article A Comparison of Online Social Networks and Real-Life Social Networks: A Study of Sina Microblogging

Research Article A Comparison of Online Social Networks and Real-Life Social Networks: A Study of Sina Microblogging Mathematical Problems in Engineering, Article ID 578713, 6 pages http://dx.doi.org/10.1155/2014/578713 Research Article A Comparison of Online Social Networks and Real-Life Social Networks: A Study of

More information

Some questions... Graphs

Some questions... Graphs Uni Innsbruck Informatik - 1 Uni Innsbruck Informatik - 2 Some questions... Peer-to to-peer Systems Analysis of unstructured P2P systems How scalable is Gnutella? How robust is Gnutella? Why does FreeNet

More information

Lecture 4 Online and streaming algorithms for clustering

Lecture 4 Online and streaming algorithms for clustering CSE 291: Geometric algorithms Spring 2013 Lecture 4 Online and streaming algorithms for clustering 4.1 On-line k-clustering To the extent that clustering takes place in the brain, it happens in an on-line

More information

Routing in packet-switching networks

Routing in packet-switching networks Routing in packet-switching networks Circuit switching vs. Packet switching Most of WANs based on circuit or packet switching Circuit switching designed for voice Resources dedicated to a particular call

More information

IC05 Introduction on Networks &Visualization Nov. 2009. <mathieu.bastian@gmail.com>

IC05 Introduction on Networks &Visualization Nov. 2009. <mathieu.bastian@gmail.com> IC05 Introduction on Networks &Visualization Nov. 2009 Overview 1. Networks Introduction Networks across disciplines Properties Models 2. Visualization InfoVis Data exploration

More information

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering

More information

Network (Tree) Topology Inference Based on Prüfer Sequence

Network (Tree) Topology Inference Based on Prüfer Sequence Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 vanniarajanc@hcl.in,

More information

Search Heuristics for Load Balancing in IP-networks

Search Heuristics for Load Balancing in IP-networks Search Heuristics for Load Balancing in IP-networks Mattias Söderqvist Swedish Institute of Computer Science mso@sics.se 3rd March 25 SICS Technical Report T25:4 ISSN 11-3154 ISRN:SICS-T--25/4-SE Abstract

More information

TOPOLOGIES NETWORK SECURITY SERVICES

TOPOLOGIES NETWORK SECURITY SERVICES TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security

More information

On the Impact of Route Monitor Selection

On the Impact of Route Monitor Selection On the Impact of Route Monitor Selection Ying Zhang Zheng Zhang Z. Morley Mao Y. Charlie Hu Bruce M. Maggs Univ. of Michigan Purdue Univ. Univ. of Michigan Purdue Univ. Carnegie Mellon and Akamai Tech.

More information

Scale-free user-network approach to telephone network traffic analysis

Scale-free user-network approach to telephone network traffic analysis Scale-free user-network approach to telephone network traffic analysis Yongxiang Xia,* Chi K. Tse, WaiM.Tam, Francis C. M. Lau, and Michael Small Department of Electronic and Information Engineering, Hong

More information

Complex Networks Analysis: Clustering Methods

Complex Networks Analysis: Clustering Methods Complex Networks Analysis: Clustering Methods Nikolai Nefedov Spring 2013 ISI ETH Zurich nefedov@isi.ee.ethz.ch 1 Outline Purpose to give an overview of modern graph-clustering methods and their applications

More information

Introduction to Support Vector Machines. Colin Campbell, Bristol University

Introduction to Support Vector Machines. Colin Campbell, Bristol University Introduction to Support Vector Machines Colin Campbell, Bristol University 1 Outline of talk. Part 1. An Introduction to SVMs 1.1. SVMs for binary classification. 1.2. Soft margins and multi-class classification.

More information

Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks

Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks Krishnamoorthy.D 1, Dr.S.Thirunirai Senthil, Ph.D 2 1 PG student of M.Tech Computer Science and Engineering, PRIST University,

More information

Small-World Internet Topologies

Small-World Internet Topologies Small-World Internet Topologies Possible auses and Implications on Scalability of End-System Multicast Shudong Jin Azer Bestavros omputer Science Department Boston University Boston, MA 0225 jins,best@cs.bu.edu

More information

arxiv:physics/0601033 v1 6 Jan 2006

arxiv:physics/0601033 v1 6 Jan 2006 Analysis of telephone network traffic based on a complex user network Yongxiang Xia, Chi K. Tse, Francis C. M. Lau, Wai Man Tam, Michael Small arxiv:physics/0601033 v1 6 Jan 2006 Department of Electronic

More information

A Study of Local Optima in the Biobjective Travelling Salesman Problem

A Study of Local Optima in the Biobjective Travelling Salesman Problem A Study of Local Optima in the Biobjective Travelling Salesman Problem Luis Paquete, Marco Chiarandini and Thomas Stützle FG Intellektik, Technische Universität Darmstadt, Alexanderstr. 10, Darmstadt,

More information

Issues in Internet s Scalability: Structure and Applications

Issues in Internet s Scalability: Structure and Applications Issues in Internet s Scalability: Structure and Applications Dissertation submitted for the degree Doctor of Philosophy Osnat Mokryn Submitted to the Senate of the Hebrew University in Jerusalem (23) This

More information

1.204 Final Project Network Analysis of Urban Street Patterns

1.204 Final Project Network Analysis of Urban Street Patterns 1.204 Final Project Network Analysis of Urban Street Patterns Michael T. Chang December 21, 2012 1 Introduction In this project, I analyze road networks as a planar graph and use tools from network analysis

More information

International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013

International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013 FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED Omar Akchiche 1 and Omar Khadir 2 1,2 Laboratory of Mathematics, Cryptography and Mechanics, Fstm, University of Hassan II Mohammedia-Casablanca,

More information

Fairfield Public Schools

Fairfield Public Schools Mathematics Fairfield Public Schools AP Statistics AP Statistics BOE Approved 04/08/2014 1 AP STATISTICS Critical Areas of Focus AP Statistics is a rigorous course that offers advanced students an opportunity

More information

Outline. EE 122: Interdomain Routing Protocol (BGP) BGP Routing. Internet is more complicated... Ion Stoica TAs: Junda Liu, DK Moon, David Zats

Outline. EE 122: Interdomain Routing Protocol (BGP) BGP Routing. Internet is more complicated... Ion Stoica TAs: Junda Liu, DK Moon, David Zats Outline EE 22: Interdomain Routing Protocol (BGP) Ion Stoica TAs: Junda Liu, DK Moon, David Zats http://inst.eecs.berkeley.edu/~ee22/fa9 (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues

More information

Continuous Fastest Path Planning in Road Networks by Mining Real-Time Traffic Event Information

Continuous Fastest Path Planning in Road Networks by Mining Real-Time Traffic Event Information Continuous Fastest Path Planning in Road Networks by Mining Real-Time Traffic Event Information Eric Hsueh-Chan Lu Chi-Wei Huang Vincent S. Tseng Institute of Computer Science and Information Engineering

More information

Analysis of peering strategy adoption by transit providers in the Internet

Analysis of peering strategy adoption by transit providers in the Internet Analysis of peering strategy adoption by transit providers in the Internet Aemen Lodhi School of Computer Science Georgia Institute of Technology aemen.lodhi@gatech.edu Amogh Dhamdhere CAIDA University

More information

Random Flow Network Modeling and Simulations

Random Flow Network Modeling and Simulations ICC 03 1 Random Flow Network Modeling and Simulations for DDoS Attack Mitigation Jiejun Kong, Mansoor Mirza, James Shu, Christian Yoedhana, Mario Gerla, Songwu Lu Computer Science Department, University

More information

Competitive Analysis of On line Randomized Call Control in Cellular Networks

Competitive Analysis of On line Randomized Call Control in Cellular Networks Competitive Analysis of On line Randomized Call Control in Cellular Networks Ioannis Caragiannis Christos Kaklamanis Evi Papaioannou Abstract In this paper we address an important communication issue arising

More information

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls

More information

The ebay Graph: How Do Online Auction Users Interact?

The ebay Graph: How Do Online Auction Users Interact? The ebay Graph: How Do Online Auction Users Interact? Yordanos Beyene, Michalis Faloutsos University of California, Riverside {yordanos, michalis}@cs.ucr.edu Duen Horng (Polo) Chau, Christos Faloutsos

More information

LOGICAL TOPOLOGY DESIGN Practical tools to configure networks

LOGICAL TOPOLOGY DESIGN Practical tools to configure networks LOGICAL TOPOLOGY DESIGN Practical tools to configure networks Guido. A. Gavilanes February, 2010 1 Introduction to LTD " Design a topology for specific requirements " A service provider must optimize its

More information

Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System

Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System Ho-Seok Kang and Sung-Ryul Kim Konkuk University Seoul, Republic of Korea hsriver@gmail.com and kimsr@konkuk.ac.kr

More information

The Impacts of Link Failure on Routing Dynamics

The Impacts of Link Failure on Routing Dynamics The Impacts of Link Failure Location on Routing Dynamics: A Formal Analysis Xiaoliang Zhao, Beichuan Zhang, Daniel Massey, Andreas Terzis, Lixia Zhang ABSTRACT One approach to understanding the complex

More information

Current Standard: Mathematical Concepts and Applications Shape, Space, and Measurement- Primary

Current Standard: Mathematical Concepts and Applications Shape, Space, and Measurement- Primary Shape, Space, and Measurement- Primary A student shall apply concepts of shape, space, and measurement to solve problems involving two- and three-dimensional shapes by demonstrating an understanding of:

More information

http://www.elsevier.com/copyright

http://www.elsevier.com/copyright This article was published in an Elsevier journal. The attached copy is furnished to the author for non-commercial research and education use, including for instruction at the author s institution, sharing

More information

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran reza.azizi@bojnourdiau.ac.ir

More information

INTRUSION PREVENTION AND EXPERT SYSTEMS

INTRUSION PREVENTION AND EXPERT SYSTEMS INTRUSION PREVENTION AND EXPERT SYSTEMS By Avi Chesla avic@v-secure.com Introduction Over the past few years, the market has developed new expectations from the security industry, especially from the intrusion

More information

A Catechistic Method for Traffic Pattern Discovery in MANET

A Catechistic Method for Traffic Pattern Discovery in MANET A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer

More information

Echidna: Efficient Clustering of Hierarchical Data for Network Traffic Analysis

Echidna: Efficient Clustering of Hierarchical Data for Network Traffic Analysis Echidna: Efficient Clustering of Hierarchical Data for Network Traffic Analysis Abdun Mahmood, Christopher Leckie, Parampalli Udaya Department of Computer Science and Software Engineering University of

More information

Stationary random graphs on Z with prescribed iid degrees and finite mean connections

Stationary random graphs on Z with prescribed iid degrees and finite mean connections Stationary random graphs on Z with prescribed iid degrees and finite mean connections Maria Deijfen Johan Jonasson February 2006 Abstract Let F be a probability distribution with support on the non-negative

More information

Traffic Engineering for Multiple Spanning Tree Protocol in Large Data Centers

Traffic Engineering for Multiple Spanning Tree Protocol in Large Data Centers Traffic Engineering for Multiple Spanning Tree Protocol in Large Data Centers Ho Trong Viet, Yves Deville, Olivier Bonaventure, Pierre François ICTEAM, Université catholique de Louvain (UCL), Belgium.

More information